Search This Blog

Mobile East 2012 - See it, Shake it, Set it

I presented the above talk about research done as part of the PRiMMA project on studying privacy management for mobile applications at the Mobile East 2012 conference. The following is the abstract of this talk:

As a result of advances in ubiquitous computing areas, and the widespread use of related technology in various applications, it is now possible to capture an unprecedented amount of information about people’s daily lives and use this information in various ways. Proponents of these developments argue that they will allow computer technologies to inform, entertain and assist us in ways that are more comfortable, intuitive and unobtrusive. On the other hand, it is argued that such pervasive data gathering is likely to cause serious invasions of individual privacy, potentially culminating in harm to individuals and society at large. This talk reports on research that has been investigating users' experience of managing their privacy when using mobile applications as well as techniques developed to better understand mobile privacy requirements. The results show the efficacy of technical solutions for improving awareness by making privacy sensitive interactions more visible to the user and some initial results on using novel interaction modes for configuring privacy settings.

Comments

Post a Comment

Popular Posts

There is a proliferation of devices being developed to form the building blocks of the Internet of Things (IoT), from Internet-connected power sockets and light bulbs to kettles, toasters and washing machines. However, to realise the full potential of the IoT, it will be necessary to allow these devices to interconnect and share data with each other to deliver the functionalities required by end-users. In recent research on end-user programming for the IoT, my colleagues Pierre Akiki, Yijun Yu and myself have proposed the notion of Visual Simple Transformations (ViSiT), that provides a visual programming paradigm for users to wire together IoT devices. The video above shows a demonstration of the ViSiT solution and full details of the approach will appear in an upcoming special issue of the ACM Transactions on Computer-Human Interaction (ToCHI).

IOT-2016 7-9 September, 2016, Stuttgart, Germany from Charith Perera
Recent DDoS attacks on key internet services, like the attack that affected the Dyn domain name service, highlighted the security challenges associated with the proliferation of insecure Internet of Things (IoT) systems. This attack exploited common vulnerabilities like the use of default administration passwords on IoT devices such as internet-enabled CCTV cameras, internet-enabled appliances and smart home devices, to recruit over hundreds of thousands of nodes into a botnet. This capability highlights the cyber security threats associated with the IoT and brings into sharp relief the importance of considering both security and privacy when designing these systems.

In recent work, presented at the Internet of Things Conference, we describe a privacy-by-design framework for assessing the privacy capabilities of IoT applications and platforms. Building on more general design strategies for privacy in informaiton …

UPDATE: Exciting opportunities to join the team for this research project - we have vacancies for a Software Engineering post-doc: http://www.open.ac.uk/about/employment/vacancies/post-doctoral-research-associate-15086and a Research Software Engineer: http://www.open.ac.uk/about/employment/vacancies/research-software-engineer-15085
I am excited to learn that our bid to undertake a new EPSRC funded research project, "Citizen Forensics" has been successful. The project sits at the intersection of software engineering, psychology, policing and power/politics/economics, exploring the use of technology to improve collaboration between citizens and the police. I will be leading the project, which will involve my colleagues Blaine Price, Bashar Nuseibeh, Graham Pike (OU Psychology / Centre for Policing Research & Learning), Mark Levine (Psychology Exeter) and Peter Bloom (OU Faculty of Business & Law).

A key challenge of the project is to investigate how adaptive software…